[Wow] [8.0.1.27219] menu

Shout-Out

User Tag List

Results 1 to 10 of 10
  1. #1
    hunterz2000's Avatar Member
    Reputation
    21
    Join Date
    Dec 2014
    Posts
    7
    Thanks G/R
    9/15
    Trade Feedback
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    [Wow] [8.0.1.27219]

    Code:
    Player: 
    ===========
    Player Name: 2C6E558
    LocalPLayerGUID:  2795870
    ZoneID:  2404AA4
    IsTexting: 273A164
    ActionBarFirstSlot:  2BA33E0
    
    Entity List
    ===========
    EntityList	= 27F8908
    FirstEntity	= 18
     NextEntity	= 70
    
    
    
    Spellbook:
    ===========
    Cooldown: 0x2609F78
    
    
    
    Targeting:
    ===========
    activeTargetGUID = 0x261DFB0
    FocusTargetGUID = 0x261E008
    MouseOverGUID =  0x2B505D8
    Last edited by hunterz2000; 07-31-2018 at 11:37 PM.

    [Wow] [8.0.1.27219]
  2. Thanks WiNiFiX, charly, Fischiii1337, MrNoble, imzz (5 members gave Thanks to hunterz2000 for this useful post)
  3. #2
    maltikism's Avatar Member
    Reputation
    8
    Join Date
    Jun 2009
    Posts
    34
    Thanks G/R
    0/1
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    To clarify... Is injection now mandatory in order to target offsets (due to memory obfuscation)? I've not been able to get any offsets working and Cheat Engine is returning the battlenet client as the module containing any of the WoW data objects.

  4. #3
    doityourself's Avatar ★ Elder ★
    Reputation
    1424
    Join Date
    Nov 2008
    Posts
    843
    Thanks G/R
    35/448
    Trade Feedback
    0 (0%)
    Mentioned
    6 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by maltikism View Post
    To clarify... Is injection now mandatory in order to target offsets (due to memory obfuscation)? I've not been able to get any offsets working and Cheat Engine is returning the battlenet client as the module containing any of the WoW data objects.
    The bnet client has nothing todo with wow. Something went wrong for you then. You want to read only? no injection needed.

  5. #4
    MrNoble's Avatar ezclap CoreCoins Purchaser
    Reputation
    535
    Join Date
    Sep 2015
    Posts
    359
    Thanks G/R
    170/218
    Trade Feedback
    2 (100%)
    Mentioned
    6 Post(s)
    Tagged
    0 Thread(s)
    Code:
    EntityList: 0x27F8908
    LocalPLayerGUID: 0x2C6E540
    
    NameCacheBase: 0x23F1488
    NameCacheNext: 0xF0
    NameCacheGuid: 0x20
    NameCacheName: 0x31
    NameCacheRace: 0x70
    NameCacheClass: 0x78
    
    CameraBase: 0x2B846B0
    CameraOffset: 0x3330
    CameraOrigin: 0x10
    CameraMatrixX: 0x1C
    CameraMatrixY: 0x28
    CameraMatrixZ: 0x34
    CameraFov: 0x40
    
    LastHardwareAction: 0x270B018
    Any fool can write code that a computer can understand. good programmers write code that humans can understand.

  6. Thanks WiNiFiX, hunterz2000, imzz (3 members gave Thanks to MrNoble for this useful post)
  7. #5
    evil2's Avatar Active Member
    Reputation
    27
    Join Date
    Feb 2009
    Posts
    172
    Thanks G/R
    31/9
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by maltikism View Post
    To clarify... Is injection now mandatory in order to target offsets (due to memory obfuscation)? I've not been able to get any offsets working and Cheat Engine is returning the battlenet client as the module containing any of the WoW data objects.
    out of process is working fine ;-)

    i don't know what exactly you looking for, but remember everything is 64 bit now, so a lot of relative addressing is going on.

    example:
    someone posted 0x201EAD0
    you won't find anything pointing to this address with the cheat engine search, because it's accessed in a relative way.
    take this wow code line:
    Wow.exe+25BB58 48 8D 0D 71 2F DC 01 lea rcx, [Wow.exe+201EAD0]
    the current code pos + 0x01DC2F71 is pointing to 0x201EAD0.
    Addressing mode - Wikipedia
    Last edited by evil2; 08-01-2018 at 06:11 PM.

  8. #6
    imzz's Avatar Active Member
    Reputation
    24
    Join Date
    May 2011
    Posts
    34
    Thanks G/R
    40/17
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Code:
    FrameScript_ExecuteBuffer = 0x306B70;
    FrameScript__GetText = 0x303880;
    Code:
                    //FrameScript_ExecuteBuffer CALL
                    asm.AddRange(new byte[] { 0x48, 0x83, 0xEC, 0x20 }); //    sub     rsp, 20h
                    asm.AddRange(new byte[] { 0x45, 0x33, 0xC0 }); //    xor     r8d, r8d
                    asm.AddRange(new byte[] { 0x48, 0xBA }); //   mov     rdx, path
                    asm.AddRange(BitConverter.GetBytes(DoStringArg_Codecave.ToInt64())); // address
                    asm.AddRange(new byte[] { 0x48, 0xB9 }); //   mov     rcx, src
                    asm.AddRange(BitConverter.GetBytes(DoStringArg_Codecave.ToInt64())); // address
                    asm.AddRange(new byte[] { 0x48, 0xB8 }); //    mov     rax,
                    asm.AddRange(BitConverter.GetBytes(IntPtr.Add(Memory.BaseAddress, (int)Offsets.FrameScript_ExecuteBuffer).ToInt64())); // address 
                    asm.AddRange(new byte[] { 0xFF, 0xD0 }); //    call rax
                    asm.AddRange(new byte[] { 0x48, 0x83, 0xC4, 0x20 }); //  add   rsp,0x20
                    asm.AddRange(new byte[] { 0xC3 }); // //retn
    Does anyone know the CGUnit_C__Interact offset and the parameters of the call?
    Last edited by imzz; 08-03-2018 at 01:02 AM.

  9. #7
    DarkLinux's Avatar Former Staff
    CoreCoins Purchaser Authenticator enabled
    Reputation
    1627
    Join Date
    May 2010
    Posts
    1,846
    Thanks G/R
    193/539
    Trade Feedback
    16 (100%)
    Mentioned
    7 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by imzz View Post
    Does anyone know the CGUnit_C__Interact offset and the parameters of the call?
    Code:
    typedef int (FASTCALL  *p_CGUnit_C__Interact) (PVOID _this);
    p_CGUnit_C__Interact Unit_C__Interact = (p_CGUnit_C__Interact)(0x009EA860 + (DWORD64)GetModuleHandle(NULL));
    Tested and working.

  10. Thanks imzz (1 members gave Thanks to DarkLinux for this useful post)
  11. #8
    imzz's Avatar Active Member
    Reputation
    24
    Join Date
    May 2011
    Posts
    34
    Thanks G/R
    40/17
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by DarkLinux View Post
    Code:
    typedef int (FASTCALL  *p_CGUnit_C__Interact) (PVOID _this);
    p_CGUnit_C__Interact Unit_C__Interact = (p_CGUnit_C__Interact)(0x009EA860 + (DWORD64)GetModuleHandle(NULL));
    Tested and working.
    Thanks @DarkLinux
    I found 0x009EA860 + GetModuleHandle is obfuscated code?,
    code:
    xor rcx, rcx jmp xxxx

    It doesn't seem to be a function,

    I tried to use my code,
    Code:
                    Wow.WowHook.Memory.Write<UInt128>(Codecave, guid);
                    var asm = new List<byte>();
                    asm.AddRange(new byte[] { 0x48, 0x83, 0xEC, 0x10 }); //    sub     rsp, 10h
                    asm.AddRange(new byte[] { 0x48, 0xB9 }); //   mov     rcx , Codecave
                    asm.AddRange(BitConverter.GetBytes(Codecave.ToInt64())); // GUID Codecave Ptr
                    asm.AddRange(new byte[] { 0x48, 0xB8 }); //    mov     rax,
                    asm.AddRange(BitConverter.GetBytes(IntPtr.Add(Cp.Wow.WowHook.Memory.BaseAddress, (int)Offsets.CGUnit_C__Interact).ToInt64())); // address 
                    asm.AddRange(new byte[] { 0x48, 0x83, 0xC4, 0x10 }); //  add   rsp,0x10
                    asm.AddRange(new byte[] { 0xC3 });  //retn
                    Wow.WowHook.InjectAndExecute(asm.ToArray());
    but it didn't work, I don't know where the problem is?

  12. #9
    DarkLinux's Avatar Former Staff
    CoreCoins Purchaser Authenticator enabled
    Reputation
    1627
    Join Date
    May 2010
    Posts
    1,846
    Thanks G/R
    193/539
    Trade Feedback
    16 (100%)
    Mentioned
    7 Post(s)
    Tagged
    0 Thread(s)
    Your problem looks to be that you're sending a GUID and not the object pointer. You can also just call 9EA430 (PVOID this, DWORD 0), the offset I gave you jsut xors and jump to the real function, not obfuscated. Also if you are going to allocate stack space use 20h, 8 x 4, for rcx, rdx,r8 and r9. Are you moving the function address into rax? I dont see you calling it...

    should be something like
    Code:
    sub rsp, 20h
    mov rcx, [TargetObjectPointer]
    xor rdx, rdx
    mov rax, [InteractAddress]
    call rax
    add rsp, 20h
    ret

  13. Thanks imzz (1 members gave Thanks to DarkLinux for this useful post)
  14. #10
    LunaBoy's Avatar Member
    Reputation
    1
    Join Date
    Aug 2018
    Posts
    2
    Thanks G/R
    0/0
    Trade Feedback
    0 (0%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Originally Posted by DarkLinux View Post
    Code:
    typedef int (FASTCALL  *p_CGUnit_C__Interact) (PVOID _this);
    p_CGUnit_C__Interact Unit_C__Interact = (p_CGUnit_C__Interact)(0x009EA860 + (DWORD64)GetModuleHandle(NULL));
    Tested and working.
    When the wow is upgraded , How to get CGUnit_C__Interact offsets address?

Similar Threads

  1. Nude WoW Pics!
    By janzi9 in forum Community Chat
    Replies: 34
    Last Post: 01-12-2007, 04:41 PM
  2. Get your first mount in WoW easily
    By Matt in forum World of Warcraft Guides
    Replies: 3
    Last Post: 11-03-2006, 09:46 PM
  3. World of Warcraft WoW!Bot (GetALifeBot) 0.61 for WoW 1.9.4 + FishBot
    By Matt in forum World of Warcraft Bots and Programs
    Replies: 43
    Last Post: 04-18-2006, 04:55 AM
  4. AutoIt Macro for WoW AFK Bot
    By Matt in forum World of Warcraft Bots and Programs
    Replies: 8
    Last Post: 04-06-2006, 06:01 AM
  5. Free WoW Glider 0.5.3 Loader
    By Matt in forum World of Warcraft Bots and Programs
    Replies: 5
    Last Post: 03-12-2006, 01:00 PM
All times are GMT -5. The time now is 03:11 PM. Powered by vBulletin® Version 4.2.3
Copyright © 2025 vBulletin Solutions, Inc. All rights reserved. User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Google Authenticator verification provided by Two-Factor Authentication (Free) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
Digital Point modules: Sphinx-based search